Visible to the public Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

TitleMachine Learning Techniques for Intrusion Detection: A Comparative Analysis
Publication TypeConference Paper
Year of Publication2016
AuthorsHamid, Yasir, Sugumaran, M., Journaux, Ludovic
Conference NameProceedings of the International Conference on Informatics and Analytics
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4756-3
Keywordscomposability, cyber physical systems, False Data Detection, False Positive, Human Behavior, IDS, machine learning, Precision, pubcrawl, Resiliency, ROC, True Positive
Abstract

With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework's security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The technique of looking at the system information for the conceivable intrusions is known intrusion detection. For the last two decades, automatic intrusion detection system has been an important exploration point. Till now researchers have developed Intrusion Detection Systems (IDS) with the capability of detecting attacks in several available environments; latest on the scene are Machine Learning approaches. Machine learning techniques are the set of evolving algorithms that learn with experience, have improved performance in the situations they have already encountered and also enjoy a broad range of applications in speech recognition, pattern detection, outlier analysis etc. There are a number of machine learning techniques developed for different applications and there is no universal technique that can work equally well on all datasets. In this work, we evaluate all the machine learning algorithms provided by Weka against the standard data set for intrusion detection i.e. KddCupp99. Different measurements contemplated are False Positive Rate, precision, ROC, True Positive Rate.

URLhttp://doi.acm.org/10.1145/2980258.2980378
DOI10.1145/2980258.2980378
Citation Keyhamid_machine_2016